Static | ZeroBOX

PE Compile Time

2021-08-17 08:41:55

PDB Path

C:\wxpqw\udydgq\jvpx\7817c7225f414072962fb8b86b2bceb7\ewuezd\xsrrfsxy\Release\xsrrfsxy.pdb

PE Imphash

e9aef503b3e4a8eb831af674be5da9e3

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0002c1f0 0x0002c200 6.24180435041
.rdata 0x0002e000 0x0000a194 0x0000a200 5.42330708587
.data 0x00039000 0x00012740 0x00000a00 1.92423158984
.00cfg 0x0004c000 0x00000004 0x00000200 0.0611628522412
.voltbl 0x0004d000 0x00000061 0x00000200 1.77040933556
.rsrc 0x0004e000 0x000001a8 0x00000200 4.1796637014
.reloc 0x0004f000 0x0000239c 0x00002400 6.65696011211

Resources

Name Offset Size Language Sub-language File type
RT_MANIFEST 0x0004e060 0x00000143 LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document, ASCII text

Imports

Library KERNEL32.dll:
0x4370d0 CloseHandle
0x4370d4 CompareStringW
0x4370d8 CopyFileW
0x4370dc CreateDirectoryW
0x4370e0 CreateFileW
0x4370e4 CreateHardLinkW
0x4370e8 CreateProcessW
0x4370ec CreateSymbolicLinkW
0x4370f0 DecodePointer
0x4370f8 DeleteFileW
0x4370fc DuplicateHandle
0x437104 ExitProcess
0x43711c FindClose
0x437120 FindFirstFileExW
0x437124 FindFirstFileW
0x437128 FindNextFileW
0x43712c FlushFileBuffers
0x437130 FormatMessageW
0x437138 FreeLibrary
0x43713c GetACP
0x437140 GetCPInfo
0x437144 GetCommandLineA
0x437148 GetCommandLineW
0x43714c GetConsoleCP
0x437150 GetConsoleMode
0x437154 GetConsoleOutputCP
0x437160 GetCurrentProcess
0x437164 GetCurrentProcessId
0x437168 GetCurrentThreadId
0x43716c GetDateFormatW
0x437170 GetDiskFreeSpaceExW
0x43717c GetExitCodeProcess
0x437184 GetFileAttributesW
0x43718c GetFileType
0x437190 GetFullPathNameW
0x437194 GetLastError
0x437198 GetLocalTime
0x43719c GetModuleFileNameW
0x4371a0 GetModuleHandleExW
0x4371a4 GetModuleHandleW
0x4371a8 GetOEMCP
0x4371ac GetProcAddress
0x4371b0 GetProcessHeap
0x4371b4 GetShortPathNameW
0x4371b8 GetStartupInfoW
0x4371bc GetStdHandle
0x4371c0 GetStringTypeW
0x4371c4 GetSystemDirectoryW
0x4371cc GetTempFileNameW
0x4371d0 GetTempPathW
0x4371d4 GetTimeFormatW
0x4371e0 HeapAlloc
0x4371e4 HeapFree
0x4371e8 HeapReAlloc
0x4371ec HeapSize
0x4371f4 InitializeSListHead
0x4371f8 IsDebuggerPresent
0x437200 IsValidCodePage
0x437204 LCMapStringW
0x43720c LoadLibraryExW
0x437210 LocalAlloc
0x437214 LocalFree
0x437218 MoveFileExW
0x43721c MoveFileW
0x437220 MultiByteToWideChar
0x437228 RaiseException
0x43722c ReadConsoleW
0x437230 ReadFile
0x437234 RemoveDirectoryW
0x437238 RtlUnwind
0x43723c SearchPathW
0x437244 SetConsoleMode
0x43724c SetConsoleTitleW
0x437258 SetFileAttributesW
0x43725c SetFilePointer
0x437260 SetFilePointerEx
0x437264 SetLastError
0x437268 SetStdHandle
0x437270 SetVolumeLabelW
0x437274 TerminateProcess
0x437278 TlsAlloc
0x43727c TlsFree
0x437280 TlsGetValue
0x437284 TlsSetValue
0x43728c WaitForSingleObject
0x437290 WideCharToMultiByte
0x437294 WriteConsoleW
0x437298 WriteFile
0x43729c lstrcatW
0x4372a0 lstrcmpW
0x4372a4 lstrcmpiW
0x4372a8 lstrcpyW
0x4372ac lstrcpynW
0x4372b0 lstrlenW
Library USER32.dll:
0x4372b8 CharNextExA
0x4372bc CharUpperBuffW
0x4372c0 GetDC
0x4372c4 GrayStringA
0x4372c8 IsCharAlphaNumericW
0x4372cc IsCharAlphaW
0x4372d0 LoadStringW
0x4372d4 MessageBoxA
0x4372d8 wsprintfW
Library SHELL32.dll:
0x4372e0 FindExecutableW
0x4372e4 SHFileOperationW
0x4372e8 SHGetFileInfoW
Library ADVAPI32.dll:
0x4372f0 GetFileSecurityW
0x4372f8 LookupAccountSidW
0x4372fc RegCloseKey
0x437300 RegCreateKeyExW
0x437304 RegDeleteKeyW
0x437308 RegEnumKeyExW
0x43730c RegOpenKeyExW
0x437310 RegQueryValueExW
0x437314 RegSetValueExW

!This program cannot be run in DOS mode.$
`.rdata
@.data
.00cfg
@.voltbl
@.reloc
D$\;D$d
<ItC<Lt3<Tt#<h
A<lt'<tt
Tt)jhZf;
Jjl^f;
V2jx_f;
F2jgYf;
F4_^[]
j"_f9y
URPQQh
u,PQRS
Wj0XPV
SPjdVQ
tlj*Yf
f9:t!V
QQSVj8j@
PPPPPWS
PP9E u:PPVWP
UQPXY]Y[
CY<u
PPPPPPPP
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
[aOni*{
~ $s%r
@b;zO]
v2!L.2
?5Wg4p
%S#[k=
"B <1=
GetConsoleWindow
VirtualProtect
%d.%d.%d
Destination supplied, processing to see if file or directory
out of memory
Out of memory
Copied successfully
Result: showattrs %x, bits %x
Request for all remaining tokens now
Read more input
Adding as first source part
No destination supplied, so need to calculate it
Searching %p as the set
Skipping %p which is part of the set
Need to read more data as outstanding brackets or carets
Skipping for loop commands due to no valid iterations
Found expression delimiter - reducing existing stacks
Found skip as %d lines
Looking for subdirectories
Finished adding all subdirectories
Skipping directories
%p %d %2.2d %p %s Redir:%s
Starting with root directory %s
Redirects now %s
Not a switch, but probably a filename/list %s
Processing qualifier at %s
Got directory %s as %s
Found as %s
Variable identified as %s
Parsed token %d(%d) as parameter %s
Parsed allremaining tokens (%d) as parameter %s
Processing FOR number %s
Set %s to %s
Resetting cwd to %s
Appending EOF to %s
Find next token after %d in %s
Input coming from %s
comparing found label %s
str before brk %s
Retrieving contents of %s
No special directory settings, using dir of %s
Using temporary file of %s
Assigning %s a value %s
Processing FOR filename %s
Calculated file name %s
Pushed variable %s
case insensitive answer-list: %s
Condition: %s
Moving to next directory to iterate: %s
detected console title: %s
p: %s, quals: %s, param1: %s, param2: %s, command: %s
Looking backwards for parameter id: %s
key not allowed: %s
param1: %s, param2: %s
Binary not found, dropping back to old behaviour
Found usebackq
Processing for set %p
Finished bracket @ %p, next command is %p
Looking for 'do ' in %p
Post-command, cmdEnd = %p
Batch completed, but was not 'called' so skipping outer batch too
Read nothing, so appending LF char and will try again
Skipping command %p due to stack depth
Found end of this nested IF statement, ending this if
Caret found at end of line
Parms supplied - working through each file
Label not found, trying from beginning of file
No parms - working probably in pipe mode
No operators for the reduce
Destination is a device
Source is a device
Could not allocate memory for extraSpace
Reached wrap point, label not found
Duplicate numbers found
Overflow detected in command
Not touching redirects for a FOR or IF command
HKCR Key '%s' deleted
Adding to source file list to be concatenated
Output needs to be piped
%d entries, maxwidth=%d, widest=%d
cols=%d, rows=%d
Unexpected failure writing to %s, rc=%d
Unexpected failure reading from %s, rc=%d
Delayed expansion now %d
Shifting variables, starting at %d
No next token found, previous was %d
Found next token after %d was %d
Popped number %d
Peeked number %d
Pushed number %d
FOR /L provided range from %d to %d step %d
Setting delayed expansion to %d
Resetting curdepth at end of line to %d
Expression resolved to %d
Envvar %s converted to %d
Found total tokens to be %d
Returning result %d, rc %d
answer: %d
p: %s, quals: %s, param1: %s, param2: %s, command: %s, if_condition_len: %d
Reducing the stacks - processing operator %c
Unrecognized operator %c
Unexpected operator %c
Popped operator %c
Pushed operator %c
Inside an IN
No operands left for the reduce?
Parsed line:
Finished all directories.
Juction links currently not supported.
Found eol as %c(%x)
del: Processing arg %s (quals:%s)
rd: Processing arg %s (quals:%s)
Processing subparm '%c' (in %s)
Processing arg '%c' (in %s)
Translate command:%s %d (at: %s)
Added to stack %s (%p->%p)
command on entry:%s (%p)
Redirect %d (%p) to %d (%p)
Redirect %d to '%s' (%p)
Found end of this IF statement (next = %p)
Skipping this command, as in not process mode (next = %p)
Manual Copying %s to %s (append?%d)
Found '(' conditions: curLen(%d), inQ(%d), onlyWS(%d), for(%d, In:%d, Do:%d), if(%d, else:%d, lwe:%d)
Flags: srcbinary(%d), dstbinary(%d), over(%d), prompt(%d)
Processing cmdList(%p) - delim(%d) bd(%d / %d) processThese(%d)
Writing trailer for '%s' gave %d(%d)
cmdList(%p), firstCmd(%s), doIt(%d), isIF(%d)
Failed to append EOF to %s (%d)
Failed to open %s (%d)
Running '%s' (%d)
Found operator %c precedence %d (head is %d)
Resolved destination is '%s' (calc later %d)
Copy source (calculated): path: '%s' (Concats: %d)
Expanding: %s (%c)
Path Parts: drive: '%s' dir: '%s' name: '%s' ext:'%s'
Looking for directory '%s'
Really changing to directory '%s'
Request change to directory '%s'
Directory, so full name is now '%s'
Recursive, Adding to search list '%s'
Issuing '%s' with redirs '%s'
First parameter is '%s'
Full dest name is '%s'
Full src name is '%s'
Found tokens as '%s'
Found delims as '%s'
Found on path as '%s'
Found file as '%s'
Recursive, looking for '%s'
Searching in '%s' for '%s'
Working on parameter '%s'
Looking for matches to '%s'
Move from '%s'('%s') to '%s'
Rename from '%s'('%s') to '%s'
set: Setting var '%s' to '%s'
set /p: Setting var '%s' to '%s'
Setting '%s' to '%s'
Using location '%s'
Handling expression '%s'
Found on path as '%s' with extension '%s'
Searching recursively in '%s'
Found parm '%s'
Reading input to parse from '%s'
Using path '%s'
mklink: Processing arg '%s'
more: Processing arg '%s'
type: Processing arg '%s'
Full commandline '%s'
set: Stripped command line '%s'
Full path name '%s'
Processing file '%s'
Source '%s'
Processing for item %d '%s'
Processing for filespec from item %d '%s'
FOR variable context: %c = '%s'
Unexpected data in optionsroot: '%s'
Parsing buffer into tokens: '%s'
Searching for: '%s'
Found 'FOR ', comparing next parm: '%s'
goto label: '%s'
/c command line: '%s'
Executing command: '%s'
Command: '%s'
Copying to : '%s'
Copying from : '%s'
Final resolved destination name : '%s'
Dest '%s'
Writing volume for '%c:'
Inserting default '*'
Found 'DO '
Found 'IN '
dddd, MMMM dd, yyyy
MM/dd/yy
February
January
Thursday
Tuesday
Wednesday
Saturday
Sunday
Monday
Friday
InitializeCriticalSectionEx
LCMapStringEx
CompareStringEx
August
_hypot
operator co_await
__restrict
CorExitProcess
HH:mm:ss
operator
_nextafter
October
November
September
December
__fastcall
__thiscall
__vectorcall
__clrcall
__stdcall
__cdecl
__pascal
__eabi
FlsSetValue
FlsGetValue
delete
FlsFree
AppPolicyGetProcessTerminationMethod
__unaligned
FlsAlloc
new[]
delete[]
1#SNAN
1#QNAN
LocaleNameToLCID
operator<=>
__ptr64
__swift_2
__swift_1
nan(snan)
(null)
nan(ind)
NAN(SNAN)
NAN(IND)
restrict(
__based(
Base Class Descriptor at (
Base Class Array'
Class Hierarchy Descriptor'
Type Descriptor'
`vector deleting destructor'
`scalar deleting destructor'
`vbase destructor'
`vector copy constructor iterator'
`eh vector copy constructor iterator'
`managed vector copy constructor iterator'
`vector vbase copy constructor iterator'
`eh vector vbase copy constructor iterator'
`vector constructor iterator'
`eh vector constructor iterator'
`managed vector constructor iterator'
`vector vbase constructor iterator'
`eh vector vbase constructor iterator'
`vector destructor iterator'
`eh vector destructor iterator'
`managed vector destructor iterator'
Complete Object Locator'
`virtual displacement map'
`vcall'
`string'
`udt returning'
`omni callsig'
`typeof'
`copy constructor closure'
`default constructor closure'
`local vftable constructor closure'
`placement delete closure'
`placement delete[] closure'
`vftable'
`local vftable'
`vbtable'
`anonymous namespace'
`local static thread guard'
`local static guard'
`dynamic atexit destructor for '
`dynamic initializer for '
operator ""
,LLD PDB.
C:\wxpqw\udydgq\jvpx\7817c7225f414072962fb8b86b2bceb7\ewuezd\xsrrfsxy\Release\xsrrfsxy.pdb
CloseHandle
CompareStringW
CopyFileW
CreateDirectoryW
CreateFileW
CreateHardLinkW
CreateProcessW
CreateSymbolicLinkW
DecodePointer
DeleteCriticalSection
DeleteFileW
DuplicateHandle
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsW
FileTimeToLocalFileTime
FileTimeToSystemTime
FillConsoleOutputAttribute
FillConsoleOutputCharacterW
FindClose
FindFirstFileExW
FindFirstFileW
FindNextFileW
FlushFileBuffers
FormatMessageW
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetConsoleScreenBufferInfo
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatW
GetDiskFreeSpaceExW
GetEnvironmentStringsW
GetEnvironmentVariableW
GetExitCodeProcess
GetFileAttributesExW
GetFileAttributesW
GetFileInformationByHandle
GetFileType
GetFullPathNameW
GetLastError
GetLocalTime
GetModuleFileNameW
GetModuleHandleExW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetShortPathNameW
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemDirectoryW
GetSystemTimeAsFileTime
GetTempFileNameW
GetTempPathW
GetTimeFormatW
GetVolumeInformationW
GetWindowsDirectoryW
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
InitializeSListHead
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
LCMapStringW
LeaveCriticalSection
LoadLibraryExW
LocalAlloc
LocalFree
MoveFileExW
MoveFileW
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
ReadConsoleW
ReadFile
RemoveDirectoryW
RtlUnwind
SearchPathW
SetConsoleCursorPosition
SetConsoleMode
SetConsoleTextAttribute
SetConsoleTitleW
SetCurrentDirectoryW
SetEnvironmentVariableW
SetFileAttributesW
SetFilePointer
SetFilePointerEx
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
SetVolumeLabelW
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
WaitForSingleObject
WideCharToMultiByte
WriteConsoleW
WriteFile
lstrcatW
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
CharNextExA
CharUpperBuffW
GrayStringA
IsCharAlphaNumericW
IsCharAlphaW
LoadStringW
MessageBoxA
wsprintfW
FindExecutableW
SHFileOperationW
SHGetFileInfoW
GetFileSecurityW
GetSecurityDescriptorOwner
LookupAccountSidW
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
KERNEL32.dll
USER32.dll
SHELL32.dll
ADVAPI32.dll
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
_z&-Ol
+.")bf
8<KO_b7
<?xml version="1.0" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1"
manifestVersion="1.0">
<trustInfo>
<security>
<requestedPrivileges>
<requestedExecutionLevel level='asInvoker' uiAccess='false'/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
0+1Q1d1u1
3+3=3M3
6(676L6h6
4)5>5a5z5
9#:E:\:
=8=J=^=
90n1w1
5Q5l5z5
5.6P6h6
627<7Z7d7
2"2S2g2
7!7+7Z7
9u:];C<(=
3+393d3u3
4,4=4[4w4
8 808R8w8
9':e:w:
1%1=1Q1c1w1
=@=R=b=*>
?$?t?~?
1/2a3}3
444F4P4r4
;5;>;H;Y;
<3<E<`<
>!?H?h?
0 020?0S0n0
464Q4h4
6G6P6f6u6
7#7N7T7d7
879A9]9
4-4R4w4
6K6]6m6
767R7[7
7=8G8q8{8
:%;D;i;r;
=&=5=T=z=
>1?S?u?
+050W0
0#1N1i1
222;2S2\2
3-383J3S3d3
737G7\7|7
9Z9l97:
1R1}2:3
:>:O:k:
;(;<;J;
>(>I>Y>s>
?>?P?`?
5#6L6b6
8_8l8z8
8+9;9_9y9
97:N:g:
<7>M>u>
?3?E?O?t?
718M8W8
949`9y9
:!:+:Z:
<-<E<_<x<
=T=b=r=
?A?K?r?|?
&0[0o0
22)232=2G2Q2[2e2o2y2
4"4>4O4Z4v4
5/5:5V5g5r5
8#8i8s8
:!:I:O:U:w:
;%;;;S;^;m;
=9=]=k=z=
>F?P?b?l?
2-2v2;3T3
5A5N5l5
5.6!7t7
73898[8h8
:8:N:s:
;);6;P;];i;
=&>4>f>
0B0p0*1T1a1
4?4Q4e4
6&6+676=6J6e6
7(8M8`8n8
9P:V:v:
;8;P;_;
;!<)<C<P<q<
=@=Q=]=z=
?A?I?R?y?
0$0O0i0
061D1|1
2 343f3
3@3L3Z3
1*1:1R1
1@2J2b2p2
45)5O5
576A6g6
8+9K9a9m9
9V:n:s:
>K>'?d?
0(0;0F0N0V0z0
3@3H3N3p3v3
4-4W4r4
:A:T:h:r:|:
3%3H3Y3y3
344A4e4
>C?Q?`?
0%0V0r0
5G5N5`5
6#6 7)7
4(5@5]5
6$6A6o6}6
="=@=\=
4 5%525l5d6v6
617g7z7
8!8'8-83898?8E8
99N9T9
<J<T<]<
=P=Z=c=l=
>$>=>K>Q>W>]>c>i>p>w>~>
??1?:?E?L?c?
1 243G3e3s3!5X5_5d5h5l5p5
=7>U>`>h>s>y>
?)?0?6?B?G?M?R?Z?n?}?
2<2@2D2H2L2h2
;);!?5?
4#4-464G4Y4
5(575L5V5i5p5|5
=>->8>=>G>L>W>b>p>
?[?e?~?
2#3.3[3x3
20D1a1
0$020M0^0w0
5=5O5[5
6.6=6H6M6R6m6|6
8'838G8]8
9&9+909@9E9J9Z9_9d9
:":):2:9:R:a:k:
;);6;O;h;
<0<Y<n<
=G=L=Q=V=
1.2H2M2
3*383D3P3^3n3
4&494r4
4c5@6G6z7
707B7T7f7x7
8)8;8M8
242;2W2^2r2{2
7$8)8.8I8V8_8d8i8
9>9N9f9z9
;"<7<H<
3.393G3
7-7:7?7M7
?8?C?P?r?
2{3J7Z7z7
99:A:I:Q:Y:w:
0;1<2L2]2e2u2
3A3P3\3k3~3
3,454>4G4r4
0 0$0(0,0004080<0@0D0H0L0P0T0X0\0`0d0h0l0p0t0x0|0
1 1$1(1,1014181<1@1D1H1L1P1T1X1\1`1d1h1l1p1t1x1|1
2 2$2(2,2024282<2@2D2H2L2P2T2X2\2`2d2h2l2p2t2x2|2
3 3$3(3,3034383<3@3D3H3L3P3T3X3\3`3d3h3l3p3t3x3|3
4 4$4(4,4044484<4@4D4H4L4P4T4X4\4`4d4h4l4p4t4x4|4
5 5$5(5,5054585<5@5D5H5L5P5T5X5\5`5d5h5l5p5t5x5|5
6 6$6(6,6064686<6@6D6H6L6P6T6X6\6`6d6h6l6p6t6x6|6
7 7$7(7,7074787<7@7D7H7L7P7T7X7\7`7d7h7l7p7t7x7|7
8 8$8(8,8084888<8@8D8H8L8P8T8X8\8`8d8h8l8p8t8x8|8
9 9$9(9,9094989<9@9D9H9L9P9T9X9\9`9d9h9l9p9t9x9|9
: :$:(:,:0:4:8:<:@:D:H:L:P:T:X:\:`:d:h:l:p:t:x:|:
3h3l3p3t3x3
9 9(90989@9H9P9X9`9h9p9x9
: :(:0:8:@:H:P:X:`:h:p:x:
; ;(;0;8;@;H;P;X;`;h;p;x;
< <$<(<,<0<4<8<<<@<D<H<L<P<T<X<\<`<d<
= =$=(=,=0=4=8=<=@=D=H=L=P=T=X=\=`=d=h=t=x=|=
8$8,848<8D8L8T8\8d8l8t8|8
9$9,949<9D9L9T9\9d9l9t9|9
:$:,:4:<:D:L:T:\:d:l:t:|:
;$;,;4;<;D;L;T;\;d;l;t;|;
<$<,<4<<<D<L<T<\<d<l<t<|<
=$=,=4=<=D=L=T=\=d=l=t=|=
>$>,>4><>D>L>T>\>d>l>t>|>
?$?,?0?8?@?H?P?X?`?h?p?x?
0 0(00080@0H0P0X0`0h0p0x0
1 1(10181@1H1P1X1`1h1p1x1
2 2(20282@2H2P2X2`2h2p2x2
3 3(30383@3H3P3X3`3h3p3x3
4 4(40484@4H4P4X4`4h4p4x4
5 5(50585@5H5P5X5`5h5p5x5
6 6(60686@6H6
;$;,;4;<;D;L;T;\;d;l;t;|;
>,>0>L>P>p>
?0?P?p?
000P0p0
101L1P1p1
6 6,60646P6T6
7 7$7(7,7074787<7H7L7P7T7X7\7`7d7
XU~]A\
2ff0fM
u_x|sQ
Sa`jVM
r +x:j
R$3n(iY8
XGZ*]=
U0I/rh
9cCcn"
K&3+AI
Wn(0Oe
P7q{W*q
Z5}Xj"
"5}Xj"
!E"5}d
b-QJUWQ(
{P$5}X
,h0{*'
kbb-Q7
<&PT6M%vs
)MKT4W
lx<~T<
)(@jOK
Gd&Ht9
vVzyxj?
gf[#Vw
=\uu[K+
(CePk4
ElGY >B;
F)MN>c
.?d%@}b"aZa
u+I<(<
"5B+*"mH
PC"?S@B
Y!2JCl+"
jctHK=
WlW,|n
kl(%vl
9cN'6,
1]V-)BV
A5i})(
w_}(<`
>O8Ej`W
#'QRHu
?74"W4Ie
<tnEQ~
*StQ),l
o[?ZFD
6fk5b
DY6'e{
I0"ll.R
@[r{P=
5p/\`
wsI"nZi
Emn-PR
ASEhCg^
!;&UwM
0\/tp(.
XS8mOt
mY6W&U
dUB(2i
_elI0N
,pdab
noQ6IS
!Q=zk
Cy8[J
r+%UN7
:{K41a
rY&+X
SM47YD
SM4BYD
UwS}24[
Zj,l|A
Z(,l|C
;.2#F!
)C`fXZ
wY6!N&N#
mSk'XL
}#tgu-
"n\Qj"
8ofS|y
[-Wtqn
<MN9%NUn
)zJ&1T[w
tVEzMz
LU6Vsd@2
G<&K.?$H
'dAK.;?
#cZ(!?MN
)WETXW
tN&!sc
KxQ`6O
8<RjnO
u"(4(r
/oYy2~)
Fn>wIj
B&ym9r
Y6!;i()
nL ^`
0u5vP9
l|_Ziu
)>qa |X
y2', /
j35}x85
9r/Hum6-jC^N
O1+C|)
SNfFD^
fU6\sd@\
+glyTZ
H_'dZ?%h@OO
ZYhl|.
h>pDI3
DEw=I#C
)za}eU@'C
a&1azX%)
Na9umAW
j=]Xj"
?~60NA
f6!i^&
-7Nd8D
CeP9F[
@gD[^
DyT|[;*
ZzyAMk
mSX'XL;
n<0"g9l
P4(%(?\
Phuo1I
gM8XjJ
CH'u%L
X(?b!rV
~si&+R
g5}X8"
((wbgr
b(bb'r1
"5}Xj"
52XR"
-58Xk"
E?q:j'
'Diij.
<O2pRC
"5}Xj"
"5}Xj"
"5}Xj"
"5}Xj"
"5}Xj"
"5}Xj"
"5}Xj"
"5}Xj"
"5}Xj"
"5}Xj"
"5}Xj"
"5}Xj"
"5}Xj"
"5}Xj"
"5}Xj"
"5}Xj"
"5}Xj"
"5}Xj"
"5}Xj"
"5}Xj"
"5}Xj"
"5}Xj"
"5}Xj"
"5}Xj"
"5}Xj"
"5}Xj"
"5}Xj"
"5}Xj"
"5}Xj"
"5}Xj"
"5}Xj"
"5}Xj"
"5}Xj"
"5}Xj"
qn6uGz
<#Y`s0u
7[&a]dAy8
M:$>_
`+q<JC
3[kJ!i
e9fi L0nx
dd?[W8
w=7"H\
fd|e+h
8PlF1x#
B.%S2Dz
g`X~%>
?'nO;;
Lg8fa<
nwI/;E
2*.mLOr
X|339T
fE_j]
')Q#;m
?H_&30
bcU3v.
BJ8&PT{
g!H\]*ku
SP|@H|
E=|4V0
(SKmN!
akECf-
%U*hqOA
KMrg,/#
\xc6g:
2!WCq3
{9DF'W
?2#oT
<Fdh`n)
+Fv0?G
``< AA
k&/NxCf"
DY@rw'
`,2VG#
^Xtb4
t,34._
wL0)ijvK
e$rD/!
Bvrv#:
rC%2Cz
"S(-`Wr3
T~Wgr%
Xfiw7Ho
yUGKG#
]o%jjL
m[r_6,
6LX*48
b@eK_@_`
*7"fx;W)
(U2 1Iq
b q|J'
8CW[W_z
=;Bm$o7
E|$~&
<3MI},
yc`$"?B-
UkGva.
3tY&X/T
/M\.:I
&i{;:e
]]sGna
37Hr7<
,=&%h%
4C'#4<
?*>XaPm
{EafHB^e|
bR kJI
k|I h=4E
1AX6v
R0LGV4
MJ<05]N
*A"xo|
_8\s@e
y">_]R
hPh9A2
)r,~b)
Eh;V]T
n.zEN8
R<^ +2z
.9,#i=
W%S'!_
sVFH C
qIY)DR
=Cmx2)
b.0 K(
$$DBNxqB
#rM4MG
`tA4|@
:8ki66!
G8F&_$
zY1bP;
hKC}y'
Q40No3
ji.b,r
mP/p7L
oA;'lL
q{1zP4l\
NKA XA
m^X=^`-
bJ6OmKj?
<1A+*k
ea&2w|Y
>:Pr;I
KG83uMg
bU6/c~
g;)dsS
e/E8<)
k[MyEn
AgE*e
U03vel
8!uM\X
$MMN0}-
2/5Gd
NoCST=
oTFS06(
\C/#JQA
Dxl~g_
Sx[se}
&&%P"[
ug<XfY
OXf8cI
sHj1SrP
\;qh*bA
@p'RNb
l%590)
;bss8eu
[M7;#i
5n;.B9
@Vgr3~
vBC U_7[
X\2`,X?C
0EVT-Z
^s@[3?
{?$>1x
4I^JUF
*\eZVX
l^Ix#[m3=)(
0=#7OQ
9K6o5N
\[VFb]d
Dyhok7
pYLHlV
a}u.1o
j4(#4;<
-F4*x<x
'<BRNa
4z?}w'
s=f!BP
V;.VbiyM
n_54D0
E34U?t&
q,D$UO
/sHf1sz
vEom6F
$;$%=RJ
q_VMy{
df7a^
/]A.L3
tW`OSUV
?:Li
Ml1Rj(
Bgb:dd~Q
jFp_z@
ZvEE!!
k4EY_DjD
@?7mZJs
1{!H$kF
EN6?4.Z
bk2Cp"
#klXdl
z}ve8$
^:y{h
>,ikOtL
i@uMV)x
P\nM3,
GoKZMW
d,{W6^eREJ|
9l<c7^
Q]HJin
9^LPk&
X7u{grh^
y5<YW_^
.;HG$*&h
BN:ZW)(
{OYh[`=
\N+aiv}
87M5vc
#W`Sb
A3#ZR4
CL+51^
<"MeBeF
ZUANn0v
66Q8U:T
dmkF5:
vi>F!b
Y]B8a
h (sx4
g0Iu=ww
;E?&ia
H#`t/d
ja1xA"
~r>D2~lX
EUmXyq
BR:^J=
uld|N1
?0`"rq
{dYo*\
\B66WA
d-sC^)
{lEAKwZ~!
`rk"@h`
PROMPT
RENAME
VERIFY
ENDLOCAL
SETLOCAL
CHOICE
MKLINK
indoATTRIB
><|& :
~fdpnxsatz$
remforifelseecho.echo:echo/doin
Software\Microsoft\Command Processor
eol=skip=tokens=delims=usebackqelse
()!~-*/%+<>&^|=,
((((( H
((((( H
(
%1!8d! directories
%s%s%s
%s%c%s
CMD.EXE /C %s
%s > %s
DefaultColor
kernel32.dll
errorlevel
\command\start.exe
\cmd.exe
.bat;.com;.cmd;.exe
\Shell\Open\Command
defined
PATHEXT
PROMPT
DISABLEDELAYEDEXPANSION
ENABLEDELAYEDEXPANSION
RANDOM
ERRORLEVEL
COPYCMD
DIRCMD
COMSPEC
---------
CONIN$
%1!-23s!
%1!-13s!
%1!*s!
Failed!
%1!10s! %2!8s! %3!10s!
%1!8d! directory
%1!10s! %2!8s! <DIR>
Total files listed:
%1!8d! files%2!25s! bytes
1 file %1!25s! bytes
%1!8d! files %2!24s! bytes
%s (%2.2d%%) --
%1!8d! directories %2!18s! bytes free
%1!18s! bytes free
Directory of %1
dddd, MMMM dd, yyyy
MM/dd/yy
syr-sy
February
January
Thursday
Tuesday
Wednesday
Saturday
Sunday
Monday
Friday
div-mv
August
zh-cht
HH:mm:ss
zh-chs
October
November
September
December
smj-no
sma-no
quz-bo
uz-uz-latn
az-az-latn
sr-sp-latn
bs-ba-latn
sr-ba-latn
uz-UZ-Latn
az-AZ-Latn
sr-SP-Latn
bs-BA-Latn
sr-BA-Latn
kok-in
uz-uz-cyrl
az-az-cyrl
sr-sp-cyrl
sr-ba-cyrl
uz-UZ-Cyrl
az-AZ-Cyrl
sr-SP-Cyrl
sr-BA-Cyrl
mscoree.dll
sms-fi
smn-fi
smj-se
sma-se
quz-pe
quz-ec
syr-SY
div-MV
zh-CHT
zh-CHS
smj-NO
sma-NO
quz-BO
kok-IN
sms-FI
smn-FI
smj-SE
sma-SE
quz-PE
quz-EC
user32
kernel32
advapi32
api-ms-win-core-file-l1-2-2
api-ms-win-core-sysinfo-l1-2-1
api-ms-win-core-fibers-l1-1-1
api-ms-win-core-synch-l1-2-0
api-ms-win-core-xstate-l2-1-0
api-ms-win-core-winrt-l1-1-0
api-ms-win-core-string-l1-1-0
ext-ms-
api-ms-
(null)
CONOUT$
api-ms-win-core-processthreads-l1-1-2
api-ms-win-appmodel-runtime-l1-1-2
api-ms-win-core-localization-l1-2-1
api-ms-win-core-datetime-l1-1-1
api-ms-win-core-localization-obsolete-l1-2-0
ext-ms-win-ntuser-dialogbox-l1-1-0
api-ms-win-rtcore-ntuser-window-l1-1-0
api-ms-win-security-systemfunctions-l1-1-0
ext-ms-win-ntuser-windowstation-l1-1-0
*a/b%c+d-e&f^g|h<i>j
Antivirus Signature
Bkav Clean
Lionic Clean
Elastic malicious (high confidence)
MicroWorld-eScan Gen:Variant.Razy.909235
CMC Clean
CAT-QuickHeal Clean
Qihoo-360 HEUR/QVM20.1.549F.Malware.Gen
McAfee Artemis!E52BB3FD16B1
Cylance Unsafe
Zillya Clean
Sangfor Clean
K7AntiVirus Clean
BitDefender Gen:Variant.Razy.909235
K7GW Clean
Cybereason Clean
Baidu Clean
Cyren W32/Stealer.J.gen!Eldorado
Symantec Clean
ESET-NOD32 a variant of Win32/Kryptik.HMCV
APEX Clean
Paloalto Clean
ClamAV Clean
Kaspersky HEUR:Trojan-Spy.Win32.Noon.gen
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
Tencent Clean
Ad-Aware Gen:Variant.Razy.909235
Emsisoft Gen:Variant.Razy.909235 (B)
Comodo Clean
F-Secure Clean
DrWeb Trojan.DownLoader41.14593
VIPRE Clean
TrendMicro Clean
McAfee-GW-Edition BehavesLike.Win32.Dropper.gc
FireEye Generic.mg.e52bb3fd16b1b414
Sophos Mal/Generic-S
SentinelOne Clean
GData Gen:Variant.Razy.909235
Jiangmin Clean
Webroot Clean
Avira Clean
MAX malware (ai score=80)
Antiy-AVL Clean
Kingsoft Win32.Troj.Undef.(kcloud)
Gridinsoft Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft Clean
Cynet Malicious (score: 100)
AhnLab-V3 Malware/Win.Generic.C4594815
Acronis Clean
BitDefenderTheta Gen:NN.ZexaF.34088.CCZ@am@wUAni
ALYac Clean
TACHYON Clean
VBA32 BScope.Trojan-Dropper.Injector
Malwarebytes Clean
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Rising Trojan.Kryptik!1.D84E (CLASSIC)
Yandex Clean
Ikarus Clean
eGambit Clean
Fortinet Clean
AVG FileRepMetagen [Malware]
Avast FileRepMetagen [Malware]
CrowdStrike Clean
MaxSecure Clean
No IRMA results available.